Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers

Authors: Loc Truong, Chace Jones, Brian Hutchinson, Andrew August, Brenda Praggastis, Robert Jasper, Nicole Nichols, Aaron Tuor | Published: 2020-04-24

Adversarial Attacks and Defenses: An Interpretation Perspective

Authors: Ninghao Liu, Mengnan Du, Ruocheng Guo, Huan Liu, Xia Hu | Published: 2020-04-23 | Updated: 2020-10-07

Adversarial Machine Learning in Network Intrusion Detection Systems

Authors: Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian | Published: 2020-04-23

ArchNet: Data Hiding Model in Distributed Machine Learning System

Authors: Kaiyan Chang, Wei Jiang, Jinyu Zhan, Zicheng Gong, Weijia Pan | Published: 2020-04-23 | Updated: 2020-05-31

Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices

Authors: Lambert T. Leong, Sean Wiere | Published: 2020-04-22

Live Trojan Attacks on Deep Neural Networks

Authors: Robby Costales, Chengzhi Mao, Raphael Norwitz, Bryan Kim, Junfeng Yang | Published: 2020-04-22 | Updated: 2020-05-27

How to compare adversarial robustness of classifiers from a global perspective

Authors: Niklas Risse, Christina Göpfert, Jan Philip Göpfert | Published: 2020-04-22 | Updated: 2020-10-15

Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks

Authors: William Aiken, Hyoungshick Kim, Simon Woo | Published: 2020-04-22

Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection

Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy | Published: 2020-04-22

Provably robust deep generative models

Authors: Filipe Condessa, Zico Kolter | Published: 2020-04-22